On 7/31/2012 1:08 PM, [email protected] wrote:
yinxing> In my view, we need to analyze the security threats and requirements systematically, and then identify defensive techniques.
As I said, I don't know how it's possible to be systematic about a thing that doesn't exist. I understand that you're trying to stick a stake in the ground but, well.
yinxing>Sometimes byzantine attack is possible. It may be more acceptable to analyze possible attackes before making some assumptions.
Insider threats are not inherently "byzantine." They are, however, "common." Melinda _______________________________________________ nvo3 mailing list [email protected] https://www.ietf.org/mailman/listinfo/nvo3
